CVE-2026-31397NULL Pointer Dereference in Linux

Severity
N/A
No vector
EPSS
0.0%
top 94.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 3

Description

In the Linux kernel, the following vulnerability has been resolved: mm/huge_memory: fix use of NULL folio in move_pages_huge_pmd() move_pages_huge_pmd() handles UFFDIO_MOVE for both normal THPs and huge zero pages. For the huge zero page path, src_folio is explicitly set to NULL, and is used as a sentinel to skip folio operations like lock and rmap. In the huge zero page branch, src_folio is NULL, so folio_mk_pmd(NULL, pgprot) passes NULL through folio_pfn() and page_to_pfn(). With SPARSEMEM_

Affected Packages3 packages

Debianlinux/linux_kernel< 6.19.10-1
CVEListV5linux/linuxe3981db444a0a18d350d9f92e3f2e8d489b54211f3caaee0f9e489fd2282d4ce45791dc8aed2da62+3
debiandebian/linux< linux 6.19.10-1 (forky)

🔴Vulnerability Details

2
OSV
CVE-2026-31397: In the Linux kernel, the following vulnerability has been resolved: mm/huge_memory: fix use of NULL folio in move_pages_huge_pmd() move_pages_huge_pmd2026-04-03
GHSA
GHSA-6fhq-5hrr-wq44: In the Linux kernel, the following vulnerability has been resolved: mm/huge_memory: fix use of NULL folio in move_pages_huge_pmd() move_pages_huge_p2026-04-03

📋Vendor Advisories

2
Red Hat
kernel: mm/huge_memory: fix use of NULL folio in move_pages_huge_pmd()2026-04-03
Debian
CVE-2026-31397: linux - In the Linux kernel, the following vulnerability has been resolved: mm/huge_mem...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-31397 Impact, Exploitability, and Mitigation Steps | Wiz